...HOWTOs, security news and updates, installation guides. - Course Developers: Individuals able to develop course material for the training of IT professions, covering: Linux, Forensics, Networking, Security, and related areas. - Linux Server Administrators/Programmers - Website Debuggers: Individuals capable of proof reading and checking sections of
...the following: * Snort IDS * Unix Command-line Cryptography tools (ssh, scp, stunnel, gpg, pgp, etc) * Command-line Compiling & Debugging (gcc & gdb) * Unix Forensics Each mini-course will consist of 10 ??" 20 lessons that should take the user no more than 10 minutes to complete each one. The lessons should be easy to follow along with
...services. We will supply a weighted keyword list like this: backup, hard drive recovery, disaster recovery, backup software, data backup, online backup, computer forensics, file recovery,... (see uploaded "Keywords" file for complete list) These articles will be used for creating content-rich pages to place on a website mainly
...common log viewers on both Operating System platforms. This tutorial should be geared toward an IT professional audience with little or no exposure to the open in computer forensics. The article should be done in parts (part 1, part 2, part 3, etc), and must be at least 7 written pages in length. If we find several good candidates here on RAC we will
I have three disk drives that are suspected of h...evaluation of the drives, including reports detailing file deletion, dates of deletion, suitable for litigation, and file recovery as per 2) above. Your methodology for handling forensics must be outlined in your bid. ## Platform The operating system on the three drives is Windows XP Professional.
This utility is intended for use in computer forensics examinations of hard disk drives. The object is to search all data on a hard drive, including unallocated and slack space, for keywords and phrases. When found, a user selectable amount of context before and after the search term will be written to a results file. For example, the user might be